{"id":"ALSA-2023:6363","summary":"Moderate: skopeo security update","details":"The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. \n\nSecurity Fix(es):\n\n* golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)\n* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)\n* golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)\n* golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)\n* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)\n* golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)\n* golang: go/parser: Infinite loop in parsing (CVE-2023-24537)\n* golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)\n* golang: html/template: improper sanitization of CSS values (CVE-2023-24539)\n* golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)\n* golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.","modified":"2026-01-30T01:13:19.999079Z","published":"2023-11-07T00:00:00Z","related":["CVE-2022-41723","CVE-2022-41724","CVE-2022-41725","CVE-2023-24534","CVE-2023-24536","CVE-2023-24537","CVE-2023-24538","CVE-2023-24539","CVE-2023-24540","CVE-2023-29400","CVE-2023-29406"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:6363"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41723"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41724"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41725"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24534"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24536"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24537"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24538"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24539"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24540"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-29400"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-29406"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2178358"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2178488"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2178492"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2184481"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2184482"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2184483"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2184484"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2196026"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2196027"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2196029"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2222167"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2023-6363.html"}],"affected":[{"package":{"name":"skopeo","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/skopeo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:1.13.3-1.el9"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2023:6363.json"}},{"package":{"name":"skopeo-tests","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/skopeo-tests"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:1.13.3-1.el9"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2023:6363.json"}}],"schema_version":"1.7.3"}